About your Search

20130416
20130424
Search Results 0 to 7 of about 8
. the pace of technology change and spread of advanced military technology to state and nonstate actors pose an encreasing challenge to america's military. this is the environment that is facing the department of defense as it enters a third year of flat or declining budgets. the onset of these constraints has led to belt tightening in military modernization, force structure, personnel costs and overhead expenditures. it has given us the opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates. secretary gates curtailed more than 30 modernization programs and trimmed overhead costs within the military services and across the defense enterprise. the realignment continued secretary panetta who crafted new strategic guidance in an f.y. 2013 defense budget plan which reduced the department's top line by $487 billion over the course of a decade. the president's request of $526.6 billion for fy 2014 continues to implement the president's defense strategic guidance and enhances the departm
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
different. >> just in stem. science, technology. >> you can easily imagine where people are just issuing an ma exclusively's approval can get a visa. do not think that would make sense. >> i think we have gone over time. i have one mins left. have one more round. >> we have not had around and she has to be gone. we said we would finish at 5:00. i will give you one more question. how is that? andand you can submit -- any member can submit questions in writing which have to be answered one week later. questions have to be submitted by 5:00 wednesday. go ahead. what specific border security measures does this bill require in the non--high risk sectors. i have struggled to review the bill in that level of detail. sectors, what i understand is, why do they have n effectiveness rate? focusing him on appre -- only focusing on apprehensions? i added that in. i do not understand why we do not have it as a brought up race. broadrought up race -- base. only happenan between sectors on an annual basis. smugglers move every few weeks. >> thank you very much. and we not just add new responsibilities,
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and missiles and stealth technology and ability to fight supersonic speeds. it may well be the way it has been designed to evade budget cutters in washington. more, sunday at 8:00 and c- span's "q&a". came into the white house. she was a 47-year-old lady who hated politics. thewas deeply depressed at death of her last surviving son. especially under the terrible circumstances in which she died. friends,ot have many unfortunately she had a wonderful family who kept her going. there always seem to be somebody there. i do not think he read very much. she was a very intellectual woman, highly educated. with that intellect and wonderful education, it seemed wasted in some way. >> the conversation on jayne pearce, the life of the 14th president, is now available on our web site. tune in monday for our next program on the first lady, mary todd lincoln. >> this documentary comes from zachary cohen of the adele davis academy in sandy springs, georgia. his message to the president looks at funding for education. it is a second prize-winning video in this year's c-span studentcam competition. >> this is
of the issues we have looked at and there are ways technology-wise to do checks. this legislation does not move in that direction. it is the opposite, prohibiting a national registry so that information about themselves are not made public and not controlled by government. they are controlled by the person who sells the gun, so therefore there is no record of gun ownership and that is specifically admitted under current law and the bills we are taking up today. the suggestion you are making is one we have had in the past. i do not think there is the legislative support to move that type of proposal, but i agree with you that it is worthy to take a look at. look at both sides had right now there is a missed trust of what government will do with that information. those answers need to be -- questions need to be answered. host: from twitter, the fact that it will not stop all people from getting guns is a weak excuse. let me put another issue on the table. you serve on the foreign affairs committee and this is the headline in the international section of "the new york times." government will do wi
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
of environmental degradation. wh fnetic pace of technolocal change and the spread of advanced military technology to state and non- state actors pose an increasing challenge to america's military. this is the strategic environment facing the department of defense as it enters a third year of flat or declining budgets. the onset of these resource constraints has already led to significant and ongoing belt- tightening in military modernization, force structure, personnel costs, and overhead expenditures. it has also given us an opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates, who canceled or curtailed more than 30 modernization programs and trimmed overhead within the military services and across the defense enterprise. these efforts reduced the department's topline by $78 billion over a five year period, as detailed in the department's fy 2012 budget plan. the realignment continued under secretary panetta, who worked closely with the president and the joint chiefs of staff to cra
Search Results 0 to 7 of about 8

Terms of Use (10 Mar 2001)